
Seminar on Multimodal Machine Learning for Human-Centric Tasks
180 180 people viewed this event.
This talk begins with a review of 5G security procedures, focusing on how security contexts are initiated and handed off, as these are particularly vulnerable operations. Several known exploits are reviewed, and possible solutions considered. Many of the vulnerabilities manifest themselves during the initial stages of establishing a connection, including cell and network acquisition, registration, and authentication and key agreement. As 6G is only now beginning to be standardized, it is our hope that some of these recommendations are incorporated into the final standard.
